Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Andrejs Romanovs is active.

Publication


Featured researches published by Andrejs Romanovs.


information technology based higher education and training | 2010

Information technology focused training in logistics

Andrejs Romanovs; Oksana Soshko; Yuri Merkuryev

Recent developments in information technology and telecommunications call for a serious reconsideration of the actual training methods and offer wide opportunities for developing active teaching/training methods. This paper shares the empirical study on developing information technology focused training laboratory for the course Logistics Information Systems. The descriptions of the three implemented laboratories are presented, as well as didactical comments about the outcomes of investigation of the above-mentioned labs are discussed. The developed laboratories give students a new impulse for both understanding of logistics from a technical point of view and developing their hands-on skills. The paper could be considered as experience sharing with colleagues teaching the subject of Logistics.


2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE) | 2015

Overview of government e-service security challenges

Pjotrs Dorogovs; Andrejs Romanovs

Nowadays when usage of Web-based applications and other interaction possibilities is becoming more and more integrated into everyday life, also government provided services are being rolled out in a form of so called e-services. Such approach allows citizens to benefit from them without even living own house. On the other hand, online processing of sensitive information is requiring modern information security measures. This paper summarizes topical security challenges of development and implementation of government e-services.


advances in databases and information systems | 2009

Application of information technologies to active teaching in logistic information systems

Andrejs Romanovs; Oksana Soshko; Arnis Lektauers; Yuri Merkuryev

Information Technology has always been a popular choice among high-school graduates when deciding on a field of study. Despite the comparatively high education levels among Latvian employees, there is still a lack of knowledge and practical skills crucial for competitiveness in a market based economy. In order to ensure relevance of the qualifications and adaptability in the fast changing environment, active learning and teaching have a special importance. Recent developments in information technology call for a serious reconsideration of the actual teaching methods and provide opportunities for developing a new educational methodology. The current paper focuses on application of IT within the course of logistics information systems for developing student practical skills and abilities. The necessity for an active teaching and learning e-environment is highlighted, and a concept of its realisation based on Web 2.0 technologies is discussed within LIS.


european conference on modelling and simulation | 2011

Domain Specific Simulation Language for IT Risk Assessment

Artis Teilans; Arnis Kleins; Ojars Krasts; Andrejs Romanovs; Yuri Merkuryev; Pjotrs Dorogovs

Information technology systems represent the backbone of a companys operational infrastructure. A companys top management typically ensures that computer software and hardware mechanisms are adequate, functional and in adherence with regulatory guidelines and industry practices. Nowadays, due to depressed economic and increased intensity of performed operations, business highly recognizes the influence of effective Information Technology risk management on profitability. Design of Unified Modelling Language (UML) based Domain Specific language (DSL) described in this paper achieves synergy from in IT industry widely used UML modelling technique and the domain specific risk management extensions. As a novelty for UML modelling, especially for simulation purposes, the presented DSL is enriched by a set of stochastic attributes of modelled activities. Such stochastic attributes are usable for further implementation of discrete-event system simulators.


international conference on speech and computer | 2014

Crowdsourcing Interactive Technology for Natural-Technical Objects Integrated Monitoring

Andrejs Romanovs; Boris V. Sokolov; Arnis Lektauers; Semyon A. Potryasaev; Viacheslav Shkodyrev

This article discusses the possibility of combining modern social interactive technologies and the process of ground-space monitoring of natural and technical objects, as well as improving the efficiency and social importance of this process, by involving public representatives to the dissemination and use of the monitoring data. Specific information-analytical monitoring system is proposed in the paper. This system is based on suggested technology of remote sensing data as well as data of other sources with social information integration in the current context.


international conference on business informatics research | 2011

Evaluation of Engineering Course Content by Bloom’s Taxonomy: A Case Study

Andrejs Romanovs; Oksana Soshko; Yuri Merkuryev; Leonids Novickis

The paper presents a case study focused on evaluation of the engineering course “Logistics information system” content according to the cognitive domain of Bloom’s taxonomy model. Authors introduce experience in elaborating course content, including description on the course teaching methods, outcomes, activities, and assessment system. Bloom’s learning outcomes model is described as an essential element in improving course quality. The paper could be considered as the experience sharing with colleagues working on engineering courses development and assessment.


Scientific Journal of Riga Technical University. Computer Sciences | 2011

Building an Intrusion Detection System for IT Security Based on Data Mining Techniques

Pjotrs Dorogovs; Arkady Borisov; Andrejs Romanovs

Building an Intrusion Detection System for IT Security Based on Data Mining Techniques This paper aims to research various data mining techniques applied to solve intrusion detection problems. In general, intrusion detection techniques can be divided into two major categories: misuse detection and anomaly detection. Taking into consideration effectiveness of the anomaly detection technique not only against known types of attacks (like misuse detection does by exploiting signature database) but also against new ones, it has become a topical issue in majority of data and computer security researches. The techniques discussed in the paper include the Hidden Markov Model (HMM) method for modelling and evaluating invisible events based on system calls, further development of Stephanie Forrests idea of the fixed-length audit trail patterns, the principle component analysis based method for anomaly intrusion detection with less computation efforts, algorithm based on k-nearest neighbour method, as well as applying association rule algorithm to audit data. Nesankcionētas piekļuves sistēmas izveidošana, izmantojot intelektuālās datu ieguves metodes Darba mērķis ir izpētīt dažādas datu ieguves metodes, kas tiek izmantotas nesankcionētas piekļuves problēmas risināšanai. Kopumā nesankcionētas piekļuves paņēmienus var iedalīt divās nozīmīgās kategorijās - ļaunprātīga izmantošanas un anomāliju noteikšana. Ņemot vērā anomāliju noteikšanas metodes efektivitāti ne tikai pret zināma veida uzbrukumiem (piemēram, izmantojot parakstu datu bāzi), bet arī pret jauniem veidiem, tā ir kļuvusi par aktuālāko tēmu lielākajā daļā datu un informācijas tehnologiju drošības pētījumos. Darbā tiek izpētītas tādas datu ieguves metodes kā Markova apslēptā modeļa (Hidden Markov Model (HMM)) metode apslēpto notikumu, kas balstās uz sistēmas izsaukumiem, modelēšanai un novērtēšanai, tālāka Stefanijas Foresteres idejas izstrāde par fiksētā garuma Auditācijas pierakstu analīzi, metode anomāliju noteikšanai, kas balstās uz galveno komponentu analīzi, K-tuvāko kaimiņu metode, kā arī asociatīvo noteikumu metodes piemērošana auditācijas datiem. Visas izpētītās datu ieguves metodes ir pietiekami labi piemērotas nesankcionētas piekļuves problēmas risināšanai, tomēr to reālā pielietošanas sfēra lielā mērā ir atkarīga no konkrētiem apstākļiem. Piemēram, paslēpto Markova modeļu izmantošanai ir jārēķinās ar augstām skaitļošanas prasībām modeļa izveidošanai, kas dažos gadījumos var būt nepieņemami. Savukārt, ņemot vērā K-tuvāko kaimiņu metodes piemērotību teksta atpazīšanai, tā arī ir salīdzinoši viegli pielietojama minētās problēmas risināšanai. Turpmākie pētījumi apskatītajā nesankcionētas piekļuves sfērā tiek novirzīti Asociatīvo noteikumu indukcijas metodes pielietošanai, ņemot vērā to salīdzinoši vieglo pielietojumu transakciju datu bāzēs, turklāt šī metode demonstrē zemu kļūdaino atklājumu līmeni. Построение системы обнаружения несанкционированных вторжений с использованием методов интеллектуального анализа данных Данная работа посвящена исследованию различных методов интеллектуального анализа данных, используемых для решения проблем обнаружения несанкционированных вторжений. В общем случае обнаружения вторжений можно разделить на две основные категории выявление злоупотреблений и обнаружение аномалий. Принимая во внимание эффективность не только для определения известных видов атак (например, обнаружение злоупотреблений реализуется, используя сигнатурную базу данных), но также и против новых, обнаружение аномалий стало актуальным вопросом в большинстве исследований по безопасности данных и компьютерной безопасности. Методы, обсуждаемые в работе, включают в себя: моделирование невидимых событий на основе системных вызовов, используя скрытые Марковские модели; дальнейшее развитие идеи Стефании Форрест по анализу аудитных данных фиксированной длины; обнаружение аномалий, используя метод главных компонентов; алгоритм, основанный на анализе К-ближайших соседей, а также построение ассоциативных правил для аудитных данных. Все изученные методы анализа данных достаточно хорошо применимы для решения проблемы несанкционированного доступа, но реальная сфера их применения существенно зависит от конкретных обстоятельств. Например, применяя скрытые Марковские модели, необходимо учитывать высокие вычислительные требования при создании модели, что в некоторых случаях может оказаться неприемлемым. С другой стороны, учитывая высокую пригодность метода К-ближайших соседей для распознавания текста, он оказывается относительно простым в использовании для решения поставленной проблемы. Планируется, что дальнейшие исследования в рамках решения проблемы несанкционированного доступа будут посвящены методу индукции ассоциативных правил, принимая во внимание относительную легкость его применения в транзакционных базах данных; кроме того, этот метод демонстрирует низкий уровень ложных детекций.


conference on computer as a tool | 2007

Application of Multi-Criteria Analysis Methods to the Tourist Information System Development

Andrejs Romanovs; Yuri Merkuryev

Recently there has been observed a global trend towards increasing the range of tourism products and services as well as ways of their distribution. This steps forth the issue of developing an information system that would provide advisory support to tourists in adopting the decision on an individual travel. The theoretical and experimental research is performed on applying the methods of multi-criteria analysis for solving the problem of choosing an individual travel. Experimental research of the sensitivity of the solution conducted allows analyzing influence of the choice criteria on the result and allows formulating an insensitive solution. Based on the results of the research it is possible to make a motivated choice of a travel according to the tourists preferences.


International Journal of Simulation and Process Modelling | 2017

TRIP-based transport travel demand model for intelligent transport system measure evaluation based on micro simulation

Nadezhda Zenina; Yuri Merkuryev; Andrejs Romanovs

Nowadays, the systems developed to integrate real physical processes and virtual computational processes - the cyber-physical systems, are used in multiple areas such as medicine, traffic management, automotive engineering, industrial robots, nanotechnology and biological systems technology. The current paper provides an overview of CPS, their application in different fields of modern business, with main video recording accent to intelligent transport system. Various transport travel demand models are considered: trip-based, tour-based and activity-based. Strengths and weaknesses of each transport travel demand model are described. ITS strategies and its evaluation measures are considered for transport intelligent transport system effective management. An example of transport management solutions realisation process based on transport microscopic modelling is presented. The example is illustrated for one of the Latvian cities - Adazi, where it was necessary to improve accessibility level for local drivers for three to five-year periods in future by evaluating different ITS measures combined with traffic organisation scheme changes.


2016 IEEE 4th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE) | 2016

Designing a evaluation tool for IT security solution implementation for IT enterprises

Oskars Podzins; Andrejs Romanovs

The aim of the publication is to brief on a safe and cost-effective security solution cost and time estimation tool for small to medium size enterprises since most of these either do not have a budget for cyber security or are miniscule in general. Evaluation tool will be used to determine approximate time and costs a small company might face implementing a comprehensive security solution. Analyzing ISO/IEC 27002:2013 standards, additional security guidelines and several recommendations was necessary to creates the IT security implementation evaluation tool. The resulting product is a tool that allows any member of an enterprise to carry out a small test to determine the necessary resources and time for security implementation.

Collaboration


Dive into the Andrejs Romanovs's collaboration.

Top Co-Authors

Avatar

Yuri Merkuryev

Riga Technical University

View shared research outputs
Top Co-Authors

Avatar

Pjotrs Dorogovs

Riga Technical University

View shared research outputs
Top Co-Authors

Avatar

Oksana Soshko

Riga Technical University

View shared research outputs
Top Co-Authors

Avatar

Arnis Lektauers

Riga Technical University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Boris V. Sokolov

Russian Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arkady Borisov

Riga Technical University

View shared research outputs
Researchain Logo
Decentralizing Knowledge